MH370 may have been deliberately taken off course

e1cb.jpg

Flight MH370 disappeared on March 8, 2014 with 239 people on board

A months-old US intelligence report that surfaced recently speculates that the missing Malaysia Airlines Flight MH370 may have been deliberately flown off course, according to an unnamed source cited by ABC News.

The theory reportedly comes from evidence of the plane changing its course, multiple times, according to The Telegraph. The first wreckage from the plane appears to have been found this week in the Indian Ocean, which disappeared last year.

The idea of foul play and sabotage has come up before. In March 2014, the same month the plane disappeared during a flight from Kuala Lumpur to Beijing, Reuters reported that military radar data suggested the plane was purposely flown hundreds of miles off the planned flight path.

Around that same time, The New York Times also reported that MH370 also saw significant changes in altitude after losing contact with ground control. The multiple changes in course reportedly suggest the plane was still under the command of a pilot.

Malaysian officials announced a few weeks after MH370 disappeared that all evidence pointed to the plane crashing in a remote area of the Indian Ocean with no survivors, but investigators so far have not determined the cause of the tragedy.
And possible debris from the plane that washed up on an island in the Indian Ocean this week might not be much help in revealing what brought the aircraft down, The New York Times reports. Even if investigators are able to confirm that the wreckage came from MH370, it would still be nearly impossible to determine where the plane entered the water, according to experts who spoke to the Times.
 
The debris could, however, prove that the plane crashed into the ocean, as investigators have always believed.
And the fact that floating debris wasn't found on the ocean's surface in the weeks following the crash supports the theory that the plane plunged into the water mostly intact and then sunk quickly. This would rule out an explosion and could be consistent with the theory that the plane was deliberately flown off course and then taken down into the ocean.

The discovery of the debris on Reunion Island near Madagascar is being treated as a "major lead" in the MH370 search, Australian officials said. Crews have been searching the southern Indian Ocean near Australia for any sign of the missing plane and have so far been unable to conclusively identify any debris belonging to the aircraft.

Business Insider:

 

« How Analytics Will Influence Connected Cars
Cyber Wars Are Good For Tech Businesses »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

VMworld

VMworld

VMworld is a global conference for virtualization and cloud computing, including associated security issues.

CYBERPOL

CYBERPOL

CYBERPOL's mission is to facilitate the widest possible mutual assistance between all cyber crime law enforcement authorities to help mitigate global cyber threats.

National Defence Radio Establishment (FRA) - Sweden

National Defence Radio Establishment (FRA) - Sweden

The National Defence Radio Establishment (Försvarets Radioanstalt), is the Swedish national authority for Signals Intelligence, also providing Information assurance services to government authorities.

ComCode

ComCode

ComCode provides consulting services and solutions in the area of digitization and cyber security for mid-sized and big businesses.

Inseego

Inseego

Inseego provides Enterprise SaaS solutions and IoT & Mobile solutions, which together form the backbone of intelligent, reliable and secure IoT services with deep business intelligence.

Callsign

Callsign

Callsign’s mission is to seamlessly power the identification of every web, mobile and physical interaction.

Verodin

Verodin

Verodin is a business platform that provides organizations with the evidence needed to measure, manage and improve their cybersecurity effectiveness.

Ultratec

Ultratec

Ultratec provide a range of data centric services and solutions including data recovery, data erasure, data destruction and full IT Asset Disposal (ITAD).

Com Laude

Com Laude

Com Laude is a domain name management company that provides strategic consulting to help companies strengthen digital brand, safeguard customers & protect brand IP.

Forum Systems

Forum Systems

Forum Systems is a global leader in API Security Management with industry-certified, patented, and proven products deployed in the most rigorous and demanding customer environments.

Cyber Defense Networking Solutions (CDNS)

Cyber Defense Networking Solutions (CDNS)

CDNS is a global network infrastructure provider whose platforms are engineered for security, optimized for speed and designed for resiliency.

Udacity

Udacity

Udacity's mission is to train the world’s workforce in the careers of the future. Our programs range from beginner to expert levels and deliver the hands-on skills for real-world expertise.

Kalima Systems

Kalima Systems

Kalima’s mission is to securely collect, transport, store and share Industrial IoT (IIoT) trusted data in real time with devices, services and mobile workers.

Fusion Cyber

Fusion Cyber

Fusion Cyber educates students in Zero Trust Risk Management, Defense, and Cyber Offense that lead to taking industry-accepted cybersecurity certifications.

StrongBox.Academy

StrongBox.Academy

StrongBox.Academy provides cybersecurity training courses that are tailored to the specific needs and challenges of the industry.

Orchestrate Technologies

Orchestrate Technologies

Orchestrate Technologies provides computer network and IT managed services for small and mid-market clients as well as small enterprise businesses.